Content-Aware Reversible Data Hiding: URHS

  • Velpuru Muni Sekhar
  • P. Buddha Reddy
  • N. Sambasiva Rao
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 695)

Abstract

This paper demonstrates a Reversible Data Hiding (RDH) technique by considering content-aware (region) information. This technique uses uniform region of histogram shift (URHS) technique to embed secret data into cover-content. Proposed technique can embed more data compared to traditional Histogram Modification (HM)-based RDH techniques. The experimental results also proved that image visual quality in terms of Peak Signal-to-Noise Ratio (PSNR) is more compared to RDH techniques based on HM. However, hybrid HM techniques such as histogram shift (HS) and differential expansion (DE), HS and prediction-error expansion (PEE), DE, PEE have more embedding capacity (EC) and approximately same PSNR. Computational cost of proposed technique is less compared to other techniques. Moreover, the experimental results suggest that proposed technique is more significant to less number of edges.

References

  1. 1.
    Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, vol. 2. MK Publication, USA (2007)Google Scholar
  2. 2.
    Muni Sekhar, V., Rao, K.V.G., Sambasive Rao, N., Gopichand, M.: Comparing the capacity, NCC and fidelity of various quantization intervals on DWT. In: Proceedings of the Third ICICSE, Springer, AISC, vol. 413, pp. 45–56 (2015)Google Scholar
  3. 3.
    Ni, Z., Shi, Y., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)CrossRefGoogle Scholar
  4. 4.
    Lin, C., Tai, W.L., Chang, C.C.: Multilevel reversible data hiding based on histogram modification of difference images. J. Pattern Recogn. 41(12), 3582–3591 (2008)CrossRefGoogle Scholar
  5. 5.
    Ni, Z., Shi, Y.Q., Ansari, N., Su, W., Sun, Q., Lin, X.: Robust lossless image data hiding designed for semi-fragile image authentication. IEEE Trans. Circuits Syst. 18(4), 497–509 (2008)Google Scholar
  6. 6.
    Gao, X., An, L., Li, X., Tao, D.: Reversibility improved lossless data hiding. J. Signal Process. 89(10), 2053–2065 (2009)CrossRefGoogle Scholar
  7. 7.
    Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)CrossRefGoogle Scholar
  8. 8.
    Jung, S.W., Le, T., Ha, S., Ko, J.: A new histogram modification based reversible data hiding algorithm considering the human visual system. IEEE Signal Process. Lett. 18, pp. 95–98 (2011)CrossRefGoogle Scholar
  9. 9.
    Zhang, W., Hu, X, L, X, Yu, N: Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans. Image Process. 22(7), 2775–2785 (2013)Google Scholar
  10. 10.
    Lin, Y.C.: Reversible image data hiding using quad-tree segmentation and histogram shifting. J. Multimed. 6(4), 349–358 (2011)CrossRefGoogle Scholar
  11. 11.
    Chou, Y.C.: High payload reversible data hiding scheme using difference segmentation and histogram shifting. J. Electron. Sci. Technol. 11(1), 9–14 (2013)Google Scholar
  12. 12.
    Zandi, Y., Mehran, M., Alireza, N., Nazanin, N., Mehran, Z.: Histogram shifting as a data hiding technique: an overview of recent developments. In: Proceedings of International Conference on Digital Information and Communication Technology and its Applications, Iran, pp. 770–786 (2011)Google Scholar
  13. 13.
    Fridrich, J.: Invertible authentication. In: Proceedings International Conference of SPIE, vol. 4314, pp. 197–208, NY (2001)Google Scholar
  14. 14.
    Li, X., Zhang, W., Gui, X., Yang, B.: Efficient reversible data hiding based on multiple histogram modification. IEEE Trans. Inf. Forensics Secur. 10(9), 2016–2027 (2015)Google Scholar
  15. 15.
    Hu, X., Zhang, W., Li, X., Yu, N.: Minimum rate prediction and optimized histogram modification for reversible data hiding. IEEE Trans. Inf. Forensics Secur. 10(3), 653–664 (2015)CrossRefGoogle Scholar
  16. 16.
    Li, X., Zhang, W., Gui, X., Yang, B.: A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans. Inf. Forensics Secur. 8(7), 1091–1100 (2013)Google Scholar
  17. 17.
    Barni, M., Bartolini, F., Piva, A.: An improved wavelet based watermarking through pixel wise masking. IEEE Trans. Image Process. 10(5), 783–791 (2001)Google Scholar
  18. 18.
    Wang, W.J., Huang, C.T., Wang, S.J.: VQ applications in steganographic data hiding upon multimedia images. IEEE Syst. J. 5(4), 528–537 (2011)CrossRefGoogle Scholar
  19. 19.
    De Vleeschouwer, C., Delaigle, J.E., Macq, B.: Circular interpretation of histogram for reversible watermarking. In: IEEE: Proceedings of Fourth Workshop on Multimedia Signal Processing, France, pp. 345–350 (2001)Google Scholar
  20. 20.
    De Vleeschouwer, C., Delaigle, J.E., Macq, B.: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans. Multimed. 5(1), 97–105 (2003)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Velpuru Muni Sekhar
    • 1
  • P. Buddha Reddy
    • 1
  • N. Sambasiva Rao
    • 1
  1. 1.Vardhaman College of EngineeringHyderabadIndia

Personalised recommendations